IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
151 - 175 of 2778 Matches Previous Page  | Next Page
A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

Big Security for Big Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more!
Posted: 19 Aug 2014 | Published: 31 Dec 2012

Hewlett-Packard Company

Security Intelligence for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett-Packard Company

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

SANS Security Analytics Survey
sponsored by Hewlett-Packard Company
ANALYST REPORT: In this analyst report by SANS, survey results indicate the need for security teams to detect and react more quickly to today's advanced threats. Learn why it's essential to invest in better security information and event management tools that offer advanced analytics and big data processing to accommodate data growth.
Posted: 19 Aug 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Bit9 Case Study Portfolio: Advanced Threat Protection in Action
sponsored by Bit9 + Carbon Black
WHITE PAPER: Download the Bit9 + Carbon Black case study portfolio now to learn how 12 of your fellow retailers and hospitality organizations are addressing today's advanced threats targeting their point-of-sale (POS) systems.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9 + Carbon Black

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9, Inc.
WHITE PAPER: Explore this brief paper that highlights 10 best practices to protect your company from a data breach while maintaining required PCI compliance (hint: all of these tips fall under these topics – visibility, asset control, enforcement, trust policy, and advance measurement).
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9, Inc.

The 2014 Next Generation Firewall Challenge
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource helps you understand the next generation firewall (NGFW), and how to choose the best solution to combat today's threats.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: In this white paper, discover a mobile security solution that provides containerization, application-wrapping and secure connectivity to healthcare organizations, helping prevent data breaches and meet compliance regulations.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

BlackBerry

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This informative paper highlights potential compliance and security gaps, what effect these gaps can have on your organization, and how to close these gaps to bolster the security of servers and endpoints. Additionally, explore a discussion around 5 core compliance controls.
Posted: 18 Aug 2014 | Published: 31 Jul 2014

Bit9, Inc.

Ushering in a New Era in Mobile Data Security
sponsored by Bluebox
WHITE PAPER: In this informative white paper, discover a new mobile security platform that balances effective protection, data visibility, and app accessibility and freedom for the user.
Posted: 18 Aug 2014 | Published: 20 Aug 2014

Bluebox

Hardening the network against targeted APT attacks
sponsored by IBM
EGUIDE: The primary foe of security professionals is no longer an asocial teenager basking in the glow of a monitor looking for an easy target, but rather the highly skilled technologists who are deliberately seeking treasure troves of sensitive information.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Five Program Management Best Practices When Designing App Security
sponsored by Veracode, Inc.
WHITE PAPER: Program management is essential during the early stages of designing an application security program. This whitepaper discusses how a company implemented program management while developing an application security program, and the results they saw.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Data Wrapping and User Experience: Two Keys to BYOD Mobile Data Security
sponsored by Bluebox
WHITE PAPER: This white paper examines a new mobile security solution that avoids the pitfalls of traditional systems by employing data-centric and employee-centric methods.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bluebox

Demystifying Security Controls for IT Risk & Audit Professionals
sponsored by Bit9, Inc.
WEBCAST: Although you may be a compliant company, if you disregard security threats and the technologies and tools to protect them, then you are as vulnerable as anyone. Watch this webcast to learn about the risks that face your organization if you don't meet compliance guidelines and how to meet these goals.
Posted: 18 Aug 2014 | Premiered: Aug 18, 2014

Bit9, Inc.

ID Solution for Enterprise Trusted Anytime, Anywhere Access to and from Mobile Devices
sponsored by HID
BROCHURE: This brochure explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token.
Posted: 18 Aug 2014 | Published: 20 Feb 2013

HID

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Rapidly Respond to Advanced Attacks in Motion with Carbon Black
sponsored by Bit9 + Carbon Black
EBOOK: Access this in-depth resource that explains why your organization would be better off by establishing a security lifecycle – one that reduces the area to attack while also detecting advanced threats in real time. Read on to learn more about evolving enemies, understanding the kill chain, and more.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9 + Carbon Black
151 - 175 of 2778 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement